From patchwork Wed Sep 25 01:38:50 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Koichiro Den X-Patchwork-Id: 1989110 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.ubuntu.com (client-ip=185.125.189.65; helo=lists.ubuntu.com; envelope-from=kernel-team-bounces@lists.ubuntu.com; receiver=patchwork.ozlabs.org) Received: from lists.ubuntu.com (lists.ubuntu.com [185.125.189.65]) (using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4XCztL2rfZz1xt3 for ; Wed, 25 Sep 2024 11:39:37 +1000 (AEST) Received: from localhost ([127.0.0.1] helo=lists.ubuntu.com) by lists.ubuntu.com with esmtp (Exim 4.86_2) (envelope-from ) id 1stH01-0000fI-0P; Wed, 25 Sep 2024 01:39:25 +0000 Received: from smtp-relay-internal-0.internal ([10.131.114.225] helo=smtp-relay-internal-0.canonical.com) by lists.ubuntu.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1stGzz-0000ew-1R for kernel-team@lists.ubuntu.com; Wed, 25 Sep 2024 01:39:23 +0000 Received: from mail-pl1-f198.google.com (mail-pl1-f198.google.com [209.85.214.198]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by smtp-relay-internal-0.canonical.com (Postfix) with ESMTPS id 9A88340643 for ; Wed, 25 Sep 2024 01:39:22 +0000 (UTC) Received: by mail-pl1-f198.google.com with SMTP id d9443c01a7336-207464a9b59so72972675ad.3 for ; Tue, 24 Sep 2024 18:39:22 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1727228361; x=1727833161; h=content-transfer-encoding:mime-version:message-id:date:subject:to :from:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=0BdTp5nWayoUcaazD7RHcGTH6019hfuAigy7gTKakYg=; b=Vxwa9DSJ0pO8YvO4jlYpvLcIknSmr4BbW5vwEmnpohVvPb9cIlmnMk0wgzNKupAfug iJ3YmaVFkVDmu2ezZ5a7ppn8JmmNwt54lIVFu/M4vV+x9AxIws23T97qQi0StVJHhw1k nv50Ebg2+5iHaKw8UussQfFOjgLLWq9YH/BFljxlFwow8+i3IPS1nRPtJ56+KL1K3ura k/wP9wqo2IP1zPLdiJpPRqF82XfGaeZsFwIN56tFA3tNbUwodjpbt4HlXaLGt6sPvOFM e0AN0f0UH9Gn231wpn78mmVPd8JEINyPMhP1B49R2Li28I0pLQ/crb8eU8dLRQllOlQK Udpg== X-Gm-Message-State: AOJu0YyVzVEGRSPrO2GAi8E+v9InUwRBcciWcpU5SCYKu9wvPGTMcdxX +90nS9pIdRi3CqSpEzp5DsrllGHZlwmQSlJ1X1EU4NR6WjFPuQEqo6aLb3J9+OJC3MwyDmJkq2B YBv+llTR6vaRR3/Kb/sqsQKBf6IKU9HbGHJSdk81UxkqN7OShjnlsPpQliNAQg/Sqr73lg6AuwC /GqVeIiMy2Kg== X-Received: by 2002:a17:903:1ce:b0:20a:ee90:91c2 with SMTP id d9443c01a7336-20afc476113mr15318315ad.13.1727228361073; Tue, 24 Sep 2024 18:39:21 -0700 (PDT) X-Google-Smtp-Source: AGHT+IGuhz0a1Wd7de4Avbeb1rvmsHncBG8x97qko0WIWjruKdxwCegLzX/niAjk+PfzjP+zu/1kSg== X-Received: by 2002:a17:903:1ce:b0:20a:ee90:91c2 with SMTP id d9443c01a7336-20afc476113mr15318095ad.13.1727228360587; Tue, 24 Sep 2024 18:39:20 -0700 (PDT) Received: from localhost.localdomain ([240f:74:7be:1:60ab:a189:1ef3:51ef]) by smtp.gmail.com with ESMTPSA id d9443c01a7336-20af16e6ce6sm15542775ad.19.2024.09.24.18.39.19 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 24 Sep 2024 18:39:20 -0700 (PDT) From: Koichiro Den To: kernel-team@lists.ubuntu.com Subject: [SRU][N][PATCH 0/1] CVE-2024-44987 Date: Wed, 25 Sep 2024 10:38:50 +0900 Message-ID: <20240925013857.98685-1-koichiro.den@canonical.com> X-Mailer: git-send-email 2.43.0 MIME-Version: 1.0 X-BeenThere: kernel-team@lists.ubuntu.com X-Mailman-Version: 2.1.20 Precedence: list List-Id: Kernel team discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: kernel-team-bounces@lists.ubuntu.com Sender: "kernel-team" [Impact] ipv6: prevent UAF in ip6_send_skb() syzbot reported an UAF in ip6_send_skb() [1] After ip6_local_out() has returned, we no longer can safely dereference rt, unless we hold rcu_read_lock(). A similar issue has been fixed in commit a688caa34beb ("ipv6: take rcu lock in rawv6_send_hdrinc()") Another potential issue in ip6_finish_output2() is handled in a separate patch. [1] See the original commit message: faa389b2fbaa ("ipv6: prevent UAF in ip6_send_skb()") [Fix] Noble: Clean cherry-pick Jammy: fixed via stable Focal: fixed via stable Bionic: fix sent to esm ML Xenial: fix sent to esm ML Trusty: not affected [Test Case] Compile and boot tested [Where problems could occur] This fix addresses an issue in ipv6 stack. Without the fix, users could potentially encounter unpredicted system behavior or a system crash. Eric Dumazet (1): ipv6: prevent UAF in ip6_send_skb() net/ipv6/ip6_output.c | 2 ++ 1 file changed, 2 insertions(+) Acked-by: Mehmet Basaran Acked-by: Chris Chiu